Classification

Category :

Malware

Type :

Worm

Aliases :

Recory.B, Recory

Summary

This worm uses the fact of a known hoax about the jdbgmgr.exe file to spread. This file is normally a windows component, this worm overwrites that file, so all the warnings telling the file is harmless become not true. The icon of Recory worm looks like that:

The information about the hoax can be found:

https://www.f-secure.com/hoaxes/jdbgmgr.shtml

The worm is programmed in Visual Basic, spreads through IRC modifying the Mirc scripts, and tries to copy itself to the shared folder of several P2P and messaging programs.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

The worm is UPX packed.

Names of the files copied to shared folders of P2P programs are:

  • -The Lord of the Rings - The Two Towers (Fast-Downloader).pif
  • -007 - Die Another Day (Rocket Downloader).pif
  • -Harry Potter and the Chamber of Secrets (Fast-Downloader).pif
  • -Britney Spears Wallpaper.pif
  • -Harry Potter and the Philosophers Stone (Movie-Downloader).pif

Among the affected programs are:

  • -Kazaa
  • -Kazaa Lite
  • -ICQ
  • -Bearshare
  • -Edonkey2000
  • -Morpheus
  • -Grokster

The worm send emails with the following text.

Message's text follows:

------------------------------------------------------------------ Hello readers,
I have just cleaned my computer from a highly damaging computer virus
Which is spreading rapidly through computer networks worldwide.
There is one way to check to see if your computer is infected with this virus.
Click the "Start" menu at the bottom left of your screen.
Click the "Find" or "Search" button.
Click the "Files or folders..." option.
Then once the search application starts, type "Jdbgmgr.exe"
If you have found this file, right-click on it and click the "Properties" tab.
If the Properties menu has a picture of a bear on it,
your computer is infected with this virus. (Note that the non-infected file
picture has a hammer and a screwdriver shown in it)
You may delete this file, but this is not the only file that the virus infects,
To remove this virus, I have included a virus removal tool in the attachments
that will scan all system files and remove any infectious code from them.
This virus removal tool is very easy to use. If you have any trouble with this
tool, read the help menu that the removal tool supplies.
If your computer is infected with this virus, It is strongly recommended that you
send this removal tool to as many people as you can to help remove the traces of
this virus worldwide.

------------------------------------------------------------------

Of course, opposite as said in the message the bear icon corresponds to the normal version of the jdbgmgr.exe file, the one with the screwdriver is the worm.

It copies itself to the following files:

In the Windows Startup folder:

  • -"LoadWin.pif"

In the "Windows\System32" folder:

-"MswinRegFiles32.com"
-"CheckThis.pif"
-"Jdbgmgr.exe"
-"Msjpeg32.pif"
-"Runsys32.bat"
-"Regfiles.bat"
-"Winbatch.bat"
-"Msjava.pif"
-"Filecmd32.com"
-"Mswin32.pif"
-"Winocx32.pif"

In the "Windows\Java" folder:

-"WinJava32.pif"
-"Javatemp.bat"
-"JavaStart.com"

In the Windows folder:

-"Jdbgmgr.exe"
-"TempFiles.pif"
-"WinStartup.pif"
-"Msupdater32.pif"
-"WinStart32.pif"
-"Winupd32.com"
-"Regedit32.com"
-"Winhlp32.com"
-"Charmap.pif"

In "Documents And Settings/[User]/Local Configuration/Temp":

-"Jdbgmgr.exe"

In shared drives as:

-"\Removal.exe".

It also saves itself with names as of the ones generated for the attachments.

Posible subjects for the message are, it can be preceeded by "Fw:" or "Fwd:"

Computer virus outbreak
Computer virus removal
About a severe computer virus
Severe computer virus alert
Virus removal tool
Severe alert
Attention employees
Alert
Readme
Important
Important Information
Update your virus scanners
Warning
Microsoft support
Knowledge Database alert
Virus warning
Virus alert
Help with removal
Removal tool
Urgent news

Possible names for the attachment can be:

RemovalTool
FixTool
KillVir
KillVirus
RepairVirus
RepairVir
Cleaner
VirusFix
CleanVirus
CleanVir
VirFix
FixVir
FixVirus
VirusRemoval
RemoveVirus
WinProtect
VirusClean
VirusCleaner
ScanVir
ScanVirus
Repair
RepairWizard
RepairScan
Scanner
FileScanner
ScanFiles
FixFiles
FileFix
RepairTool
VirusRepair
VirRepair
RepairFiles
FileRepair
AntiVirus
AntiVir
RemoveVir
CleanFiles
FileClean
FileCleaner
FileRepairer
CleanTool
CleanerTool
FixComputer
RepairComputer
CleanComputer
FixComp
RepairComp
CleanComp
FixPC
RepairPC
CleanPC
FixSystem
RepairSystem
CleanSystem
FixSys
RepairSys
CleanSys
SystemFix
SystemClean
SystemRepair
SysFix
SysClean
SysRepair
Recovery

With any extension from the following list (.exe, .pif, .com, ).

The following key is created in the Windows' registry:

[HKEY_CURRENT_USER\Software\Zed/[rRlf]\Recovery\1.1\]